MBSS - CISCO Access Switch 9200L - v1
MBSS - CISCO Access Switch 9200L - v1
Minim
Control
Sr.No. Control Objective
number
43 Configuring Kerberos
82 Set 'key'
83 Set 'key-string'
93 Set 'key'
94 Set 'key-string'
1. Access Rules
Default device configuration does not require strong user authentication
potentially enabling unfettered access to an attacker that is able to reach the
device. Creating a local account with privilege level 1 permissions only allows
the local user to access the device with EXEC-level permissions and will be
unable to modify the device without using the enable password. In addition,
require the use of an encrypted password as well
Unused ports should be disabled, if not required, since they provide a potential
access path for attackers. Some devices include both an auxiliary and console
port that can be used to locally connect to and configure the device. The
console port is normally the primary port
used to configure the device; even when remote, backup administration is
required via console server or Keyboard, Video, Mouse (KVM) hardware. The
auxiliary port is primarily used for dial-up administration via an external
modem; instead, use other available methods.
VTY ACLs control what addresses may attempt to log in to the router.
Configuring VTY lines to use an ACL, restricts the sources where a user can
manage the device. You should limit the specific host(s) and or network(s)
authorized to connect to and configure the device, via an approved protocol, to
those individuals or systems authorized to administer the device. For example,
you could limit access to specific hosts, so that only network managers can
configure the devices only by using specific network management
workstations. Make sure you configure all VTY lines to use the same ACL.
Restricting the type of network devices, associated with the addresses on the
access-list, further restricts remote access to those devices authorized to
manage the device and reduces the risk of unauthorized access.
Unused ports should be disabled, if not required, since they provide a potential
access path for attackers. Some devices include both an auxiliary and console
port that can be used to locally connect to and configure the device. The
console port is normally the primary port used to configure the device; even
when remote, backup administration is required via console server or
Keyboard, Video, Mouse (KVM) hardware. The auxiliary port is primarily
used for dial-up administration via an external modem; instead, use other
available methods.
3. Banner Rules
"Network banners are electronic messages that provide notice of legal rights to
users of
computer networks. From a legal standpoint, banners have four primary
functions.
-- First, banners may be used to generate consent to real-time monitoring
under Title III.
-- Second, banners may be used to generate consent to the retrieval of stored
files and records pursuant to ECPA.
-- Third, in the case of government networks, banners may eliminate any
Fourth Amendment "reasonable expectation of privacy" that government
employees or other users might otherwise retain in their use of the
government's network under O'Connor v. Ortega, 480 U.S. 709 (1987).
-- Fourth, in the case of a non-government network, banners may establish a
system administrator's "common authority" to consent to a law enforcement
search pursuant to United States v. Matlock, 415 U.S. 164 (1974)." (US
Department of Justice APPENDIX A: Sample Network Banner Language)
"Network banners are electronic messages that provide notice of legal rights to
users of
computer networks. From a legal standpoint, banners have four primary
functions.
-- First, banners may be used to generate consent to real-time monitoring
under Title III.
-- Second, banners may be used to generate consent to the retrieval of stored
files and records pursuant to ECPA.
-- Third, in the case of government networks, banners may eliminate any
Fourth Amendment "reasonable expectation of privacy" that government
employees or other users might otherwise retain in their use of the
government's network under O'Connor v. Ortega, 480 U.S. 709 (1987).
-- Fourth, in the case of a non-government network, banners may establish a
system administrator's "common authority" to consent to a law enforcement
search pursuant to United States v. Matlock, 415 U.S. 164 (1974)." (US
Department of Justice APPENDIX A: Sample Network Banner Language)
"Network banners are electronic messages that provide notice of legal rights to
users of
computer networks. From a legal standpoint, banners have four primary
functions.
-- First, banners may be used to generate consent to real-time monitoring
under Title III.
-- Second, banners may be used to generate consent to the retrieval of stored
files and records pursuant to ECPA.
-- Third, in the case of government networks, banners may eliminate any
Fourth Amendment "reasonable expectation of privacy" that government
employees or other users might otherwise retain in their use of the
government's network under O'Connor v. Ortega, 480 U.S. 709 (1987).
-- Fourth, in the case of a non-government network, banners may establish a
system administrator's "common authority" to consent to a law enforcement
search pursuant to United States v. Matlock, 415 U.S. 164 (1974)." (US
Department of Justice APPENDIX A: Sample Network Banner Language)
"Network banners are electronic messages that provide notice of legal rights to
users of computer networks. From a legal standpoint, banners have four
primary functions.
First, banners may be used to generate consent to real-time monitoring
under Title III.
Second, banners may be used to generate consent to the retrieval of stored
files and records pursuant to ECPA.
Third, in the case of government networks, banners may eliminate any
Fourth Amendment "reasonable expectation of privacy" that government
employees or other users might otherwise retain in their use of the
government's network under O'Connor v. Ortega, 480 U.S. 709 (1987).
Fourth, in the case of a non-government network, banners may establish a
system administrator's "common authority" to consent to a law enforcement
search pursuant to United States v. Matlock, 415 U.S. 164 (1974)." (US
Department of Justice APPENDIX A: Sample Network Banner Language)
4. Password Rules
5. SNMP Rules
SNMP read access allows remote monitoring and management of the device.
The default community string "private" is well known. Using easy to guess,
well known community string poses a threat that an attacker can effortlessly
gain unauthorized access to the device.
The default community string "public" is well known. Using easy to guess,
well known community string poses a threat that an attacker can effortlessly
gain unauthorized access to the device.
If ACLs are not applied, then anyone with a valid SNMP community string
can potentially monitor and manage the router. An ACL should be defined and
applied for all SNMP access to limit access to a small number of authorized
management stations segmented in a trusted management zone. If possible,
use SNMPv3 which uses authentication,
authorization, and data privatization (encryption
SNMP ACLs control what addresses are authorized to manage and monitor
the device via SNMP. If ACLs are not applied, then anyone with a valid
SNMP community string may monitor and manage the router. An ACL should
be defined and applied for all SNMP community strings to limit access to a
small number of authorized management stations segmented in a trusted
management zone
If SNMP is enabled for device management and device alerts are required,
then ensure the device is configured to submit traps only to authorize
management systems.
6. Login Enhancements
Authenticating to the Boundary Router This section describes the first layer of
security that remote users must pass through when they attempt to access a
network. The first step in the Kerberos authentication process is for users to
authenticate themselves to the boundary router. The following process
describes how users authenticate to a boundary router:
The combination of the IP address and UDP port number creates a unique
identifier, that enables RADIUS requests to be sent to multiple UDP ports on a
server at the same IP address. If two different host entries on the same
RADIUS server are configured for the same service (for example,
authentication) the second host entry that is configured
functions as the failover backup to the first one. The RADIUS host entries are
chosen in the order that they were configured
An RSA key pair is a prerequisite for setting up SSH and should be at least
2048 bits. NOTE: IOS does NOT display the modulus bit value in the Audit
Procedure.
This limits the number of times an unauthorized user can attempt a password
without having to establish a new SSH login attempt. This reduces the
potential for success during online brute force attacks by limiting the number
of login attempts per SSH connection.
If the PAD service is not necessary, disable the service to prevent intruders
from accessing the X.25 PAD command set on the router.
7. Logging Rules
The device can copy and store log messages to an internal memory buffer. The
buffered data is available only from a router exec or enabled exec session.
This form of logging is useful for debugging and monitoring when logged in
to a router.
This determines the severity of messages that will generate simple network
management protocol (SNMP) trap and or syslog messages. This setting
should be set to either "debugging" (7) or "informational" (6), but no lower.
This is required so that the router sends log messages to the logging server
from a consistent IP address
Without generating audit records that are specific to the security and mission
needs of the organization, it would be difficult to establish, correlate, and
investigate the events relating to an incident or identify those responsible for
one.
7. NTP rules
Using authenticated NTP ensures the Cisco device only permits time updates
from authorized NTP servers
To ensure that the time on your Cisco router is consistent with other devices in
your network, at least two (and preferably at least three) NTP Server/s
external to the router should be configured.
Ensure you also configure consistent timezone and daylight savings time
setting for all devices. For simplicity, the default of Coordinated Universal
Time (UTC).
8. Loopback Rules
Software-only loopback interface that emulates an interface that is always up.
It is a virtual interface supported on all platforms.
Alternate loopback addresses create a potential for abuse, mis-configuration,
and inconsistencies. Additional loopback interfaces must be documented and
approved prior to use by local security personnel.
This is required so that the AAA server (RADIUS or TACACS+) can easily
identify routers and authenticate requests by their IP address
Set the source address to be used when sending NTP traffic. This may be
required if the NTP servers you peer with filter based on IP address.
This is required so that the TFTP servers can easily identify routers and
authenticate requests by their IP address.
9. Routing Rules
Source routing is a feature of IP whereby individual packets can specify
routes. This feature is used in several kinds of attacks. Cisco routers normally
accept and process source routes. Unless a network depends on source routing,
it should be disabled.
Tunnel interfaces should not exist in general. They can be used for malicious
purposes. If they are necessary, the network admin's should be well aware of
them and their purpose
Configuring access controls can help prevent spoofing attacks. To reduce the
effectiveness of IP spoofing, configure access control to deny any traffic from
the external network that has a source address that should reside on the
internal network. Include local host address or any reserved private addresses
(RFC 1918). Ensure the permit rule(s) above the final deny rule only allow
traffic according to your organization's least privilege policy.
Configuring access controls can help prevent spoofing attacks. To reduce the
effectiveness of IP spoofing, configure access control to deny any traffic from
the external network that has a source address that should reside on the
internal network. Include local host address or any reserved private addresses
(RFC 1918).
Ensure the permit rule(s) above the final deny rule only allow traffic according
to your organization's least privilege policy.
1. Access Rules
Perform the following to determine if SSH is the only transport method for
incoming VTY logins:
The result should show only "ssh" for "transport input"
hostname#sh run | sec vty
Perform the following to determine if the EXEC process for the aux port is
disabled:
Verify no exec
hostname#sh run | sec aux
Verify you see the following "no exec"
hostname#sh line aux 0 | incl exec
Perform the following to determine if inbound connections for the aux port are
disabled:
Verify you see the following "Allowed input transports are none
hostname#sh line aux 0 | incl input transports
Perform the following to determine if aaa accounting for EXEC shell session
is required:
Verify a command string result returns
hostname#sh run | incl aaa accounting exec
Perform the following to determine if aaa accounting for connection is
required:
Verify a command string result returns
hostname#sh run | incl aaa accounting network
3. Banner Rules
4. Password Rules
5. SNMP Rules
Verify the result reads "SNMP agent not enabled"
hostname#show snmp community
Verify the result show the appropriate group name and security model
hostname#show snmp groups
Verify the result show the appropriate user name and security settings
hostname#show snmp user
6. Login Enhancements
Configures your Cisco IOS XE device for login parameters that help provide
DoS detection.
hostname#show running-config | inc login block
Hostname#show auto secure config
Hostname#show ip admission
7. NTP rules
From the command prompt, execute the following commands:
hostname#show run | include ntp
8. Loopback Rules
Verify the appropriate key chain and mode are set on the appropriate
interface(s)
hostname#sh run int {interface_name}
Configure the VTY ACL that will be used to restrict management access
to the device.
hostname(config)#access-list <vty_acl_number> permit tcp
<vty_acl_block_with_mask> any High
hostname(config)#access-list <vty_acl_number> permit tcp host
<vty_acl_host> any
hostname(config)#deny ip any any log
AAA)
For each SNMPv3 group created on your router add privacy options by
issuing the following command... High
hostname(config)#snmp-server group {group_name} v3 priv
For each SNMPv3 user created on your router add privacy options by
issuing the following command.
hostname(config)#snmp-server user {user_name} {group_name} v3 High
encrypted auth sha
{auth_password} priv aes 128 {priv_password} {acl_name_or_number}
Configure at the NTP key ring and encryption key using the following
command High
hostname(config)#ntp authentication-key {ntp_key_id} md5 {ntp_key}
Configure each NTP Server to use a key ring using the following
command High
hostname(config)#ntp server {ntp-server_ip_address}{key ntp_key_id}